Everyone is susceptible to DOS (Denial of Service) attacks, but we do have more specialty in place to prevent and
remedy those situations than any other provider in the industry. We have special filters and rate-limiting entries entered on our internet backbone’s configuration of our connectivity. When a new attack makes it through and harms our service, we fix it immediately so it will never hurt us again. We have a “2-minute rule”. We promise to remedy a DOS situation within 2 minutes.

Your company is just so cool. How can I get merchandise like t-shirts, mugs, and mousepads?

Current clients that refer a friend to JEAH Communications, LLC will receive one month of service absolutely free.. and it comes with no limitations! Refer 2 friends, earn 2 months, refer 12, and earn a whole year of additional service! Just tell the referee to put your username in the “Referred by” spot in our online order form.

I have an urgent issue and need to contact an administrator right away.

Login to your account and type “motd” or refer to your “welcome” e-mail for paging instructions.

This can mean one of two things. Either your public_html directory does not contain an index.html file, or the permissions on your home directory/html directory are not correct. If you have an index.html file in your public_html folder, then you need to type the following command, word for word, into your shell account:

chmod 711 /home/$LOGIN ; chmod 711 /home/$LOGIN/public_html

Do you support Frontpage extensions, MySQL, or have any kind of a control panel?

Sorry, but to ensure maximum security, we do not support FP or run a control panel on the shell account
server. But we do allow MySQL.

What is CGI? Can I use it?

CGI (Common Gateway Interface) is a standard for interfacing external applications with information servers. A plain HTML document is static, which means it exists in a constant state: a text file that doesn’t change. CGI, on the other hand, is executed in real-time, so it can output dynamic information. If your account type lists “CGI support”, then you can use it.

What is SSI? Can I use it?

SSI (Server Side Includes) is used when a web page or other program needs to include another web page or document’s contents in order to function. It’s used often for things like text counters and random quote generators, or to execute CGI scripts within a web page or program. If your account type lists “SSI support”, then you can use it.

What is PHP? Can I use it?

PHP (short for PHP: Hypertext Preprocessor) is a server-side, cross-platform, HTML embedded scripting language. It’s used often to power larger web pages that have lots of content where SSI would just be too inefficient. If your account type lists “PHP4 support”, then you can use it.

Do you offer web-based shell account access?

Yes. We have a very easy web-based program that will allow you to SECURELY connect to your shell account from any web browser. You can try it out by surfing to https://telnet.JEAH.net.

What is SSH? Do you support it?

SSH stands for Secure Shell. It allows you to connect via an encrypted means, rather than by plain-text telnet. We support this type of connection. You need a special program to use it, though. There are many programs you can purchase for PC, Mac, tablets, and even mobile devices — or you can use PuTTY for Windows which we have made free from http://www.jeah.net/putty.exe.

Is it possible to use speed up compile times by using your dual processors?

Yes. By utilizing both of our processors when compiling, your compile speed will more than double. When you’re compiling, type make -j2 instead of just make.

Yes, you can use FTP (File Transfer Protocol) to transfer files to and from our service. You will need a program at home to do this. There are many programs you can purchase to do this, or you can use CoreFTP Lite which we have made free, available at http://www.jeah.net/coreftplite21.exe.

How do I send/receive e-mail with my account?

You can use Pine, the most popular UNIX mail client, to read your e-mail right on our mail server. Just login to your shell account and type pine at the prompt. Pine has easy-to-understand menus that will explain exactly how to access your e-mail.

You can also access your e-mail from any web browser by using our SECURE custom webmail system. Just point the browser to https://webmail.JEAH.net and enter your username and password in the lefthand column of the site. You will want to leave the “POP3 server” and “SMTP server” options as they are.

Finally, you can download your e-mail using a POP3 mail client. The most popular Windows POP3 mail client is Outlook Express. It should already be installed on your computer at home if you run Windows. Just set your “incoming” POP3 server to mail.JEAH.net to be able to download your e-mail. When connecting, you will be asked for your username and password – this is the username and password of your shell account. Your “outgoing” SMTP server will be the server that was assigned to you by your ISP for outgoing e-mail. We do not currently allow our clients to relay (remotely send) their e-mail through our service.

*** SOMETHING COOL ***: You can use our vhost domains for email! If you’d like to have yourusername@anyvhost
email, just email us and let us know! We can set it up for you!

Do you help stop unsolicited email? Can I get rid of spam in my account?

We aggressively attempt to protect you from the lowest common denominators on the internet, spammers. All incoming
unsolicited email (spam) that meets intense criteria is labeled as *****SPAM***** in the subject line.

You can use this labeling to filter mail to a SPAM folder of your choice, or simply delete it. We recommend filtering
the *****SPAM***** to a spam folder so you can occasionally breeze through it and catch any false positives.

Here’s how to set pine to forward all *****SPAM***** to a new folder called SPAM from the command prompt:

pine

‘s’ for setup

‘r’ for rule

‘f’ for filter

‘a’ for add

Scroll to “Subject Pattern” and enter *****SPAM*****

Scroll to Filter Action, choose MOVE

click on FOLDER LIST, type in SPAM

‘e’ for exit

‘y’ to save

Most other email clients can filter to a spam folder or trash using the *****SPAM***** subject line as well.

Can’t I just auto-delete the spam on the server level? Wipe it before it hits my inbox/webmail?

You sure can. If you don’t mind the risk of false-positives, email us and we’ll explain how. It’s easy.

Can I stay logged into my shell account for long periods of time while having no activity?

Please don’t. Idling uses valuable resources that your other processes could take advantage of. To help enforce this, we automatically log you out after 60 minutes of inactivity. If you need to keep a process running when you’re not there, you’re more than welcome to detach it!

How much disk space do I have left to use? How do I find out my quota?

Please read over your specific account plan to verify your disk quota. If it says “unlimited”, that means you may use as much space as necessary (within reason, and within our AUP guidelines, of course). If there is a set quota for your account type, you can verify how much you’re using so far by logging into your shell account and typing du -h -s . at the command prompt.

How do I keep a program running even if I’m logged out?

You can use “screen” to do that. Just type “screen” and the command you would normally type to start the program. For example, if you usually start “juiceman” with “./juiceman -a”, type “screen ./juiceman -a”. The program will be started. When you are ready to logout and force the program to run in the background, press Control-A and then D to “detach” it. To “re-attach” the program, that is, reactivate the program session, type “screen -r”. Once you are re-attached, to stop running the program, you can press Control-C and then type “exit”.

Do you have vhosts for use on IRC? How do I list them?

Yes, and JEAH’s list is hundreds-deep. We have THE most comprehensive stock of virtual hosts in the industry. No other shell provider compares, although many have tried. Using JEAH’s vhosts will let you have an amusing, clever hostname on IRC like “ill.bbiaf.com” instead of the boring, standard hostname like “broadband-11.pipe3.noc5.city.state.yourisp.com”. You can view our current, complete list of virtual hosts by visiting http://www.JEAH.net/vhosts.shtml, or logging into your shell account and typing vhosts at the prompt.

What are these non-resolving IPs that I heard about. What are the benefits of these as vhosts?

For the first time, at no extra cost to you, JEAH is offering non-resolving IP addresses. On IRC, these hosts do not resolve to any domain name. You use them just like any vhost. Now you can better “hide” your connection on IRC for extra privacy. You’ll only find this feature exclusively at JEAH!

How do I use your vhosts on IRC?

You can use our virtual hosts by connecting to IRC directly from our server, using the IRC client, BitchX. To do this, simply login to your shell account and type BitchX -Hthe.vhost.you.would.like.to.use.goes.here.com at the prompt. You can also take advantage of our vhosts by using them with the IRC bouncer program, BNC. Doing this is explained in a separate section in this document.

Do you have I:lines on any IRC servers? Can you promise me connectivity to Efnet, DALnet, Undernet, or IRCnet?

Yes. We have an I:line on efnet.JEAH.net, an I:line on ircnet.JEAH.net, and a peering agreement with DALnet. This means that you are guaranteed a connection to EFnet, IRCnet, and DALnet if you are one of our clients. We cannot assure connectivity to any other IRC server or network. This does not mean that you cannot connect to any other network, it just means that we can’t promise a connection. We are constantly working to gain additional I:lines to be able to promise you dedicated access to the IRC networks you enjoy. If you’d like us to check our connectivity to a specific network, just email us and we’ll be glad to.

How do I install and use the IRC bouncer, BNC?

Installing using the popular IRC bouncer program, BNC, is easy. BNC will allow you to connect to an IRC server and “bounce” through our server first. When you arrive at the IRC server, you will appear to actually be connecting from our server. This keeps people on IRC from knowing your real hostname, which prevents DOS (Denial of Service) attacks. Morever, it’s just another way to look cool to your fellow chatters!

Follow these step-by-step instructions to install and use BNC:

Login to your shell account and type getbnc at the prompt. This installs a pre-compiled version of BNC to your home directory.

Type cd bncinstall ; ./bncsetup to run the interactive setup program that will ask you questions to get your BNC up and running.

The first screen you will see is a welcome screen. Press Enter on your keyboard to move on from this screen. After answering each question, you’ll also want to press Enter to continue through the installation.

The next window will ask you to select a port number for your BNC to listen on. BNC needs to bind itself to a port so it is ready when you need to connect to it. You must choose a port that is not already in use by someone else. If you choose a port someone else is using, you’ll have to repeat this setup process and find one not in use. Please pay attention to the notification of ports that you may use. We have special groups of ports available for BNC usage. You can choose a port outside of these groups, but we can’t guarantee BNC will work!

The third question asks about maximum users on your BNC. You may be tempted to share this cool new toy with all of your friends. Please don’t. We don’t allow sharing of accounts or processes. You can have a maximum of 2 connections to your BNC at any given time, but they must be you and you only (you might want to have one BNC connection open to DALnet and one open to Efnet). If you know you’ll only need 1 connection at a time, set it to 1.

You’ll now have to enter a password that you’ll provide when you connect to your BNC. This could be your shell account password, or a different password that you make up just for BNC.

Also needed is a supervisor password. Most people will just want this to be the same as the password you provided in the last question. The supervisor password lets you see who is connected to your BNC and disconnect users that don’t belong. Since you won’t be sharing your BNC, this really isn’t necessary.

You’re now asked for an “Allow method”. Select 0 for Any IP unless you’re an advanced user and want to try to setup custom allow paths. Keep in mind that if you mess this up, you’ll have to start all over again!

Here you can select to choose the virtual host you would primarily like to use through your BNC. If you’d like to do this, choose Y for Yes and enter it. If you’d rather just choose the vhosts you’d like to use as you connect to your BNC, choose N for No. If you choose Y, you’ll be prompted for the primary virtual host, and then asked if you’d like to enter any other virtual hosts that you may want to use on IRC. If you select to do this, enter a virtual host, press enter, and keep doing that until you have entered all the vhosts you’d like to have stored in your BNC configuration. When you have entered all that you want, press q and then enter.

The installation program now asks if you would like to log activity on your BNC. If you select yes, you will be prompted for the name of the file you’d like the activity logged to. Most users will use the default bnc.log, but you can name it whatever you want.

You can have BNC display a message of the day (MOTD) at this point. Most users will choose N for No here, but if you’re advanced and know what it means, choose Y for Yes and specify the name of the file for this.

You’re just about done! Time to save what you’ve just done! BNC installation now asks you for a file name to save your configuration to. Most users will use the default bnc.conf (in fact, if you want to keep things real simple, please use it), but if you’re advanced and know what you’re doing, go ahead and change it.

To activate your BNC, type ./bnc at the command prompt. If everything is configured correctly, it should say “Successfully went into the background”. If something is misconfigured, you will get an error message. The most common error message is “Unable to bind to socket”, which means you have to reconfigure your BNC to listen on a different port, because the port you chose is already in use by someone else.

Once your BNC program is activated, open your IRC client and type /server awww.JEAH.net PORT_YOU_CHOSE_IN_CONFIGURATION

You will be asked for your password. Type /pass PASSWORD_YOU_CHOSE_IN_CONFIGURATION

At this point, you can select the virtual host you want to use. Type /VIP to list virtual hosts you may have input into the configuration, or just type /VIP THE.VHOST.YOU.WANT.TO.USE.COM.

Now you can connect to the IRC server. Type /conn IRC.SERVER.COM

You’re all set! Enjoy using IRC by bouncing through JEAH!

Is there a way to make my bots and BNCs automatically restart if they terminate?

Yes. You can use one of our system tools called crontab to do that.To setup your bot in crontab so that your bot automatically restarts when it is terminated, you can use a simple tool that is included with the eggdrop program that takes easy advantage of crontab. Just type this wham of a command:

To setup your BNC to automatically restart when it terminates, follow these instructions:

Type export EDITOR=pico at the shell prompt.

Type crontab -e at the shell prompt. This will bring up a text editor called pico.

Enter the following line in this editor: 0,20,40 * * * * /home/yourusername/yourbncdirectory/bncchk >/dev/null 2>&1

Press Control-X (Control and the letter X together at the same time).

Enter Y when prompted to save, and just press enter when asked to specify a filename.

You’re done! Your BNC will now restart when it terminates.You can view your current crontab entries by typing crontab -l at the prompt, and crontab -r to remove your crontab entries.

How do I install and use a bot?

Installing and using eggdrop, the most popular kind of IRC bot is a bit tricky, and should only be tackled if you have a lot of patience and are willing to take things step-by-step. We have tried to make the process easier by having our own pre-compiled version of the eggdrop bot program right on our server. If you’ve never used a bot before, you’ll find eggdrop provides a staggering array of options for IRC channel management and protection, and can easily be expanded further to provide even more functions. Follow these basic instructions for getting your eggdrop bot online:

Login to your shell account and type getegg at the prompt.

You will be asked to choose a directory name for your bot files to reside. This directory name is relative to your home directory, so you can just type eggdrop or something of the such and it will be installed correctly.

Next you’ll need to choose which version of eggdrop you’d like to use. We have 5 types available. Choose the version of your choice by typing its number and pressing enter.

Next you need to edit the config file, eggdrop.conf.dist, which is found in the directory you chose in the initial installation. You can either edit the file from your shell account using a text editor such as pico, or you can download the file to your computer at home to edit and upload it when complete. The editing is fairly straightforward; just make sure you read all of it very carefully. When you are done configuring the bot, you will want to rename the file to the name of your bot, for example, typing at the shell prompt mv eggdrop.conf.dist joebot.conf if your bot’s name is going to be “JoeBot”.

** NEW ** Now instead of editing your conf file line-by-line, you can create it with a Windows program! If you’d like to do this, simply download the program from http://www.jeah.net/eggdropconfmaker.zip! Save the created configuration file as yourbotsname.conf and upload to the server when you’re done!

To activate your eggdrop bot, type ./eggdrop -m yourbotsname.conf at shell prompt. You are only adding the -m part this one time to get your bot initially activated. After this one time, you won’t ever want to put the -m part there – just type ./eggdrop yourbotsname.conf at the shell prompt.

Go to the IRC server that your bot is connecting to and your bot should be there. If it is not there, you may be on a different IRC network then that of the IRC servers you specified in the config file, it may be banned from the servers you specified, or the nickname(s) you specified in the config file may be taken by someone else.

The first thing you need to do when your bot comes on IRC is say hello. Use /msg yourbotsname hello. This will cause the bot to recognize you as the owner of the bot. You must set a pass by typing /msg yourbotsname pass yourpass, substituting yourpass with whatever you want to use as your password.

To manage your bot, you can /DCC CHAT yourbotsname and enter your password. There, you can view all the commands available to you by typing .help in the DCC chat window.

You’re all done! If you want to add special features to your bot, you will use what are called TCL scripts. You will download the specific script to your shell account and put it in the “scripts” subdirectory of your eggdrop directory is named, then insert the line source scripts/whatever.tcl into the yourbotsname.conf configuration file. Be sure to rehash your bot using .rehash in the DCC chat after you do this. You can find a large selection of TCL scripts at http://www.egghelp.org.

How many bots can I run in my account?

There is no limit to the amount of bots you may run in your shell account, as long as you stay within your allotted background processes.